Hacking

Pierluigi Paganini July 31, 2015
Hack your General Motors Car with $100 Ownstar

The popular hacker Samy Kamkar has presented a new gadget that could be exploited to hacks GM Cars. The tool allows to locate, Unlock, and Start Them. Do you have a General Motors car? Do you have $100 to spare? Do you want to hack your car? If the reply to my questions is yes, […]

Pierluigi Paganini July 31, 2015
APT 29 use Twitter to control its Hammertoss data stealer

Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask the activities of their data-stealer malware. The hackers belonging to the APT 29 […]

Pierluigi Paganini July 31, 2015
Hackers can disable high-tech sniper rifles and change the target

A couple of married researchers demonstrated hot to disable high-tech sniper rifles and change their targets with unpredictable consequences. Hacking, hacking, always hacking … this time we will discuss remote hacking of High-tech Sniper Rifles. Hackers can compromise High-tech Sniper Rifles and causing problems pointing to the target. Hackers can gain access to the $13,000 […]

Pierluigi Paganini July 30, 2015
Trend Micro revealed a new Android vulnerability renders Android Devices inoperable

Researchers from Trend Micro discovered a new critical vulnerability in the Android mobile OS that can be exploited to crash mobile devices. Experts from Trend Micro discovered a new vulnerability, an integer overflow bug in the Android mediaserverĀ service, that affects versions of Android starting with 4.3 Jelly Bean and up to 5.1.1 Lollipop. The flaw […]

Pierluigi Paganini July 30, 2015
BLEkey – How to Clone RFID cards with a $10 device

Accuvant researchers will be releasing an open source piece of hardware dubbed BLEkey that can be used to circumvent these RFID card readers. Do you require to pass a card into a device to enter in your company’s office?Ā  Most probably you are using a card based on Radio-Frequency Identification (RFID) technology to grant the […]

Pierluigi Paganini July 30, 2015
United Airlines reportedly hacked by same APT that breached OPM, Anthem

United Airlines reportedly hacked by same APT that breached OPM, Anthem. Let’s try to understand why and which are the risks for the US citizens. A ChineseĀ APT group Ā believed to be responsible for a series of high-profile data breaches that affected theĀ U.S. Office of Personnel Management, theĀ Anthem, and more recently theĀ United Airlines. According the media […]

Pierluigi Paganini July 30, 2015
A part of an unclassified Pentagon email network taken down over suspicious activity

Part of a Pentagon email network taken down over suspicious activity, the US authorities are investigating on the alleged intrusion. New problems for the White House emerges from the cyberspace, a portion of the Department of Defence’sĀ email network has been taken down over suspicious activity. According to Pentagon spokeswoman, the unclassified email network used by […]

Pierluigi Paganini July 29, 2015
Bitphone, the “untraceable” voIP service

Let’s explain what makes the new Bitphone VoIP service, a perfect tool to perform some social engineering calls. Bitphone is a new VoIP service, a perfect tool to perform some social engineering calls, but why? Bitphone is like a Payphone, the only difference is that in this case you need to pay it with bitcoins […]

Pierluigi Paganini July 29, 2015
Disclosed critical vulnerabilities affecting the PHP file Manager

PHP File Manager was affected by several critical vulnerabilities for nearly 5 years, according to the security consultant Sijmen Ruwhof. In July 2010 Ruwhof was looking for a web base file manager that he could use in his own web server when he came across with PHP file Manager. At the time, he found out […]

Pierluigi Paganini July 29, 2015
Experts discovered a new Google Drive phishing campaign

Experts discovered a new Google Drive phishing campaign in which the threat actors deployed phishing web pages on Google Drive. Once again phishers exploited Google’s reputation running a phishing campaign aimed to steal user Google credentials and access to the multitude services offered by the company. The new phishing campaign was discovered by the security […]